This act contains three sections covering various misuses:
Unauthorised access to computer material
Unauthorised access with intent to commit or facilitate commission of further offences
Unauthorised modification of computer material.
The first section deals with 'basic hacking', which is getting access to a computer system, data or a program with permission. For example, a pupil finds and uses a teacher's password to gain access to the school computer system and even though no damage to files or data has been done, this is still a crime.
The second section applies to situations when a computer system is being used to help in committing another crime. For example, a computer being used to steal money from a bank account.
The third section covers 'expert hacking', which is the modification of data on a computer system without permission. For example, the deliberate planting or viruses on a computer on a computer system. It also covers the deletion or modification or another user's file.
The first section deals with 'basic hacking', which is getting access to a computer system, data or a program with permission. For example, a pupil finds and uses a teacher's password to gain access to the school computer system and even though no damage to files or data has been done, this is still a crime.
The second section applies to situations when a computer system is being used to help in committing another crime. For example, a computer being used to steal money from a bank account.
The third section covers 'expert hacking', which is the modification of data on a computer system without permission. For example, the deliberate planting or viruses on a computer on a computer system. It also covers the deletion or modification or another user's file.